cybersecurity Tag

Nearly every industry and government IT security standard around the world, including the NIST Cybersecurity Framework, the Center for Internet Security (CIS 20), Australia’s Essential 8, the Department of Defense’s CMMC and PCI requires vulnerability scanning.  This almost universal requirement for network vulnerability scanning stems from...

When burglars case a house to burgle, they look for easy access. Unlocked doors and open windows are the most common entry points into homes. Cybercriminals also use common entry points to hack into your clients’ networks. What are the most vulnerable points cybercriminals target?...

Battling cybercrime is an ongoing effort for every organization. It requires vigilance and attention to detail to maintain defenses against enemies looking to exploit every chink in the armor to penetrate corporate networks and do bad things.  SMBs are particularly susceptible to cybercrime because of their limited...

“All our data is stored on servers.” You hear this over and over again, but it's almost never true. In fact, you can usually find legally protected data, including Personally Identifiable Information (PII), Protected Health Information (PHI) and business-sensitive data like payroll information, stored on desktops...

Cyberattacks have skyrocketed by more than 400 percent since the early part of 2020. And small and medium-sized businesses (SMBs) were a big part of this number. Some sources report up to 71% of cyberattacks hit SMBs. Yet, 43% of SMBs lack cybersecurity defense plans, and one in five SMBs fail to use endpoint security.     Why this lack...